SAP NetWeaver Process Integration Security Guide
Before You Start
SAP NetWeaver PI Security Guide (Dual-Stack)
Technical System Landscape
Communication
Technical Communication
Business Communication
Communication Destinations
Destinations for Technical Communication
Destinations for Business Communication
Destinations for Monitoring and Alerting
Destinations for Cross-Component BPM
Message-Level Security
Certificate Store
Archiving Secured Messages
Network and Transport Layer Security
HTTP and SSL
RFC and SNC
FTP and FTPS
Communication Ports
Network Zones
SSL Administration in a Dual-Stack Installation
Adapter-Specific Security Settings
Adapters Running on the Integration Engine
Adapters Running on the Advanced Adapter Engine
IDoc Adapter (AAE)
RFC Adapter
SOAP Adapter
SAP Business Connector Adapter
Marketplace Adapter
RosettaNet RNIF Adapters
CIDX Adapter
File/FTP, JDBC, JMS, and Mail Adapters
HTTP Adapter (AAE)
Adapters Running on the Adapter Engine (Java SE)
Security Concepts for B2B Communication
User Management and Authorization Concepts (Dual-Stack)
User Management for Non-Central AAE (PI-AF)
Standard Users (Dual-Stack)
User Store
Changing Service Users
Service Users for Internal Communication
Service Users for Message Exchange
User Types
Roles (AS ABAP)
Integration into Single Sign-On Environments
Roles for Cross-Component Business Process Management
UME Roles and Actions (AS Java)
UME Actions
Roles for Secure Usage of the Integration Directory Programming
Role-Based Authorizations in ES Repository and Integration Direc
ACL-Based Authorizations
ACL-Based Authorizations in ES Repository and Integration Direct
ACL-Based Authorizations for Service Users
Data Storage Security
Data Storage Security for the Enterprise Services Repository
Data Storage Security for the Integration Directory
Data Storage Security for the Advanced Adapter Engine
Data Storage Security for the Integration Engine
Further Security-Related Topics
Cross-Site Request Forgery Protection
Excluding Web Pages From Being Indexed by Web Crawlers
Protection of Sensitive Message Data
Potential Visibility of Sensitive Message Data
Messaging Components of the Integration Engine
Java-Based Messaging Components
Using SAP NetWeaver PI in PCI-Compliant Scenarios
Auditing
Links to Additional PI Administrative Tools
SAP NetWeaver PI Security Guide (AEX)
Technical System Landscape
Communication
Technical Communication
Business Communication
Communication Destinations
Destinations for Technical Communication
Destinations for Business Communication
Destinations for Monitoring and Alerting
Message-Level Security
Archiving Secured Messages
Network and Transport Layer Security
HTTP and SSL
Communication Ports
Adapter-Specific Security Settings
Security Concepts for B2B Communication
User Management and Authorization Concepts (AEX)
Standard Users (AEX)
Service Users for Internal Communication
Data Storage Security
Further Security-Related Topics
Security Aspects of the SAP Process Integration Tools (in Eclips
Protection of Sensitive Message Data
Auditing